CN113360855A - Account login method and device, electronic equipment and computer readable storage medium - Google Patents

Account login method and device, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN113360855A
CN113360855A CN202010152589.2A CN202010152589A CN113360855A CN 113360855 A CN113360855 A CN 113360855A CN 202010152589 A CN202010152589 A CN 202010152589A CN 113360855 A CN113360855 A CN 113360855A
Authority
CN
China
Prior art keywords
login
account
application
confirmation instruction
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010152589.2A
Other languages
Chinese (zh)
Inventor
池晓焱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongke Star Map Co ltd
Original Assignee
Zhongke Star Map Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongke Star Map Co ltd filed Critical Zhongke Star Map Co ltd
Priority to CN202010152589.2A priority Critical patent/CN113360855A/en
Publication of CN113360855A publication Critical patent/CN113360855A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the disclosure provides an account login method, an account login device, electronic equipment and a computer-readable storage medium, wherein the method comprises the following steps: scanning and analyzing the two-dimensional code by using a third-party application on the client to acquire the authority information of a third-party application account required by the application program in the login application terminal; generating a login and authorization page according to the authority information; and responding to the first operation of the login and authorization page, generating a login confirmation instruction for confirming the login of the third-party application account, and sending the login confirmation instruction to the internet server. According to the method and the device, the user can select the authority to be authorized when logging in the application program to be logged by using the third-party application account, and the safety of the user account is improved.

Description

Account login method and device, electronic equipment and computer readable storage medium
Technical Field
Embodiments of the present disclosure relate generally to the field of information processing technologies, and in particular, to an account login method, an account login apparatus, an electronic device, and a computer-readable storage medium.
Background
With the rapid development of internet technology, various kinds of software and applications are widely popularized, and the software and the applications have their own account systems and servers (referred to as application servers in this application) for storing accounts. When a user needs to access the software and the application through the third-party application, the user usually needs to scan the two-dimensional code provided by the software and the application, then a login-allowed page is popped up in the third-party application, and login can be completed by performing login operation on the login-allowed page. However, the user does not know about the specific rights information for these software, third party applications that the application needs, or knows but cannot select which rights are granted.
Disclosure of Invention
In a first aspect of the present disclosure, an account login method is provided, including: scanning and analyzing a two-dimensional code by using a third-party application on a client to acquire authority information of a third-party application account required by logging in an application program in an application terminal, wherein the two-dimensional code is generated by an internet server according to an authorization request sent by the application terminal, is sent to the application terminal and is displayed by the application terminal; generating a login and authorization page according to the authority information, wherein the authority information is displayed on the login and authorization page and can be selected on the login and authorization page; responding to the first operation of the login and authorization page, generating a login confirmation instruction for confirming the login of the third-party application account, and sending the login confirmation instruction to the internet server, wherein the login confirmation instruction comprises the selected authority information; the first operation comprises selecting the permission information on the login and authorization page.
As to the above aspect and any possible implementation manner, there is further provided an implementation manner, after generating a login confirmation instruction for confirming that the third-party application account is logged in for the first operation of the login and authorization page and sending the login confirmation instruction to the internet server, the method further includes: and generating a permission list according to the permission information, and displaying the permission list, wherein the permission list comprises the permission information selected in the first operation.
The foregoing aspect and any possible implementation manner further provide an implementation manner, where after generating a login confirmation instruction for confirming to login the third-party application account in response to the first operation on the login and authorization page and sending the login confirmation instruction to the internet server, the method further includes: responding to the second operation, generating a offline confirmation instruction and sending the offline confirmation instruction for confirming that the third party application account is offline from the application program in the application terminal to the internet server; the second operation comprises executing a logoff operation at the client.
In a second aspect of the present disclosure, an account login apparatus is provided, including: the system comprises a scanning and analyzing module, a storage module and a display module, wherein the scanning and analyzing module is used for scanning and analyzing a two-dimensional code to acquire authority information of a third-party application account required by an application program in a login application terminal, and the two-dimensional code is generated by an internet server according to an authorization request sent by the application terminal, is sent to the application terminal and is displayed by the application terminal; the page generation module is used for generating a login and authorization page according to the authority information, the authority information is displayed on the login and authorization page, and the authority information can be selected on the login and authorization page; the instruction sending module is used for responding to the first operation of the login and authorization page, generating a login confirmation instruction for confirming that the third-party application account is logged in and sending the login confirmation instruction to the internet server, wherein the login confirmation instruction comprises the selected authority information; the first operation comprises selecting the permission information on the login and authorization page.
The above-described aspects and any possible implementation further provide an implementation, further including: and the list generating module is used for generating a permission list according to the permission information and displaying the permission list, wherein the permission list comprises the permission information selected in the first operation.
The above aspect and any possible implementation manner further provide an implementation manner, where the instruction sending module is further configured to generate a offline confirmation instruction in response to the second operation, and send the offline confirmation instruction to the internet server, where the offline confirmation instruction confirms that the third-party application account is offline from the application program in the application terminal; the second operation comprises executing a logoff operation at the client.
In a third aspect of the present disclosure, an electronic device is provided, comprising a memory having stored thereon a computer program and a processor implementing the method according to any of the first aspects when executing the program.
In a fourth aspect of the present disclosure, a computer-readable storage medium is provided, on which a computer program is stored, which program, when executed by a processor, performs the method according to any one of the first aspect.
In the account login method, the account login device, the electronic device and the computer-readable storage medium provided by the embodiment, the third-party application on the client is used for scanning and analyzing the two-dimensional code to obtain the authority information of the third-party application account required by the application program in the login application terminal, the login and authorization page is generated according to the authority information, and finally, the login confirmation instruction for confirming the login of the third-party application account is generated through the first operation of the login and authorization page and is sent to the interconnection server, so that the user can select the authority of the third-party application needing authorization when the user logs in the application program by using the third-party application account, and the safety of the user account is improved.
It should be understood that what is described in this disclosure section is not intended to limit key or critical features of the embodiments of the disclosure, nor is it intended to limit the scope of the disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. In the drawings, like or similar reference characters designate like or similar elements, and wherein:
FIG. 1 illustrates a schematic diagram of an exemplary operating environment in which embodiments of the present disclosure can be implemented;
FIG. 2 is a schematic diagram illustrating an interaction method among the client, the application server and the interconnection server shown in FIG. 1;
FIG. 3 shows a flow diagram of an account login method according to an embodiment of the present disclosure;
FIG. 4 shows a block diagram of an account login device according to an embodiment of the present disclosure;
FIG. 5 illustrates a block diagram of an exemplary electronic device capable of implementing embodiments of the present disclosure.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present disclosure more clear, the technical solutions of the embodiments of the present disclosure will be described clearly and completely with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are some, but not all embodiments of the present disclosure. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
In addition, the term "and/or" herein is only one kind of association relationship describing an associated object, and means that there may be three kinds of relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
FIG. 1 illustrates a schematic diagram of an exemplary operating environment in which embodiments of the present disclosure can be implemented. Referring to fig. 1, the runtime environment includes a client 101, an application 102, an application server 103, and an interconnection server 104.
The client 101 is a device used by a user, and may be an electronic device with a shooting function, such as a mobile phone and a tablet computer, and a third-party application is configured in the client 101.
The application terminal 102 may be a browser, and the application terminal 102 is used to display a login interface and an application interface of an application program to be logged in to a user.
The application server 103 according to the present disclosure is a server for implementing the application program, that is, a server for providing a user login technology for the application program based on an account system of a user side.
The interconnection server 104 disclosed by the disclosure is a server which provides a user login technology for an account of a third-party application based on a user account system, helps the third-party application to realize functions of user login, an authorization range and the like in an application program, and the interconnection server 104 can manage the user account or call the user account.
In this embodiment, each user account may correspond to one piece of authority information, or may correspond to multiple pieces of authority information. For example, if the wechat account is used as an account of a third-party application that logs in the application program, the authority information corresponding to the account may be an avatar of the wechat account, and/or a gender of the wechat account, and/or a friend relationship of the wechat account.
Fig. 2 is a schematic diagram illustrating an interaction method among the client 101, the application 102, the application server 103, and the interconnection server 104 shown in fig. 1. Referring to fig. 2, when logging in an application program in the application terminal 102 by using a third party application, the following steps are performed:
in step 201, the application terminal 102 receives a login request input by a user. At this point, the client 101 may present the user with a login interface for the account of the third party application.
Step 202, after receiving the login request, the application terminal 102 sends an authorization request to the internet server 104.
The authorization request may include authorization parameters, which may include one or more of an application identification, authorization scope information, an application callback address, anti-spoofing information, and an application key. The application identifier is an application identifier number allocated by the internet server 104 for the third-party application, and one application identifier corresponds to one third-party application; the authorization scope information refers to a scope of authority for operating with an account of the third-party application if the application server 103 obtains authorization from the internet server 104, for example, a permission for allowing the application program to be logged in to use a head portrait and a nickname of the account of the third-party application, or a permission for issuing a message instead of the account; the application callback address is an address where the third-party application receives the message. The anti-fake information and the application secret key have the function of improving the safety of information transmission.
In step 203, the interconnection server 104 generates a two-dimensional code after receiving the authorization request.
The two-dimensional code is also called a two-dimensional bar code, and is a bar code with readability expanded on the basis of a one-dimensional bar code. The device scans the two-dimensional code and can acquire information contained therein by recognizing binary data recorded in the length and width of the bar code. Two-dimensional codes record more complex data, such as pictures, network links, etc., than one-dimensional barcodes. The two-dimensional code information generated in this step may include the authorization parameter, that is, the application identifier, the authorization range information, the application callback address, the anti-counterfeit information, the application key, and the like.
In step 204, the internet server 104 sends the two-dimensional code information to the application terminal 102.
In step 205, after receiving the two-dimensional code information, the application terminal 102 displays a two-dimensional code image.
In step 206, the client 101 reads information in the two-dimensional code image.
The two-dimensional code image may be scanned by software having a scanning function installed in the client 101 to read information therein.
In step 207, the client 101 sends the account information of the third-party application and the read information in the two-dimensional code image to the internet server 104.
In step 208, the internet server 104 verifies the user account information and the two-dimensional code information sent by the client 101 according to the pre-stored user account information and the two-dimensional code information generated by the pre-stored user account information.
When the user account information is sent, the application software with the two-dimensional code scanning function can be started at the client 101, the application software and the internet server 104 belong to the same operator, the application software has a login function, the user account information is sent to the internet server 104 in the process of logging in the application software, and the verification process is completed. As long as the user prestores (i.e., registers) his account in the internet server 104 in advance, the authentication of the user account information can be realized. The communication connection between the application terminal 101 and the internet server 104 can be established through verification, so that the two-dimensional code information can be sent to the internet server 104 for verification.
In step 209, if the authentication is passed, the internet server 104 sends the information of passing the authorization and the preset user identifier to the application server 103.
The user identification is the unique identification of the user after the user logs in the third-party application. Through the user identification, the third-party application can enable the corresponding user to log in. The user identification uniquely corresponds to one user account, and the user identifications corresponding to the same user account for logging in different third-party applications are different.
The authorization pass information may include an authorization validity string and anti-counterfeit information. The authorization validity string is used to identify the validity of the user authorization. The information of the anti-counterfeiting device is used for improving the safety of information transmission.
In step 210, the application server 103 sets the user account corresponding to the received user identifier to be in a logged-in state.
In step 211, the application 102 obtains the logged-in status information from the application server 103.
In step 212, the application terminal 102 sets the interface of the third-party application to the logged-in state of the user.
According to the method, the client 101 logs in the third-party application in the client 101 in a two-dimensional code scanning mode and authorizes the third-party application, any plug-in is not required to be installed on the application 102, and a user name and a password are not required to be repeatedly input in the account authorization and account login process of the third-party application, so that the account safety is improved. But the scope of authorization of a user for a particular right is unclear.
How to select the authorization scope when logging in the application program to be logged in by using the third party application is described below with reference to specific embodiments.
Fig. 3 shows a flowchart of an account login method according to an embodiment of the present disclosure. Referring to fig. 3, the method comprises the steps of:
step 301, scanning and analyzing the two-dimensional code by using the third-party application on the client 101 to obtain the permission information of the third-party application account required by the application program in the login application terminal 102.
In this embodiment, the two-dimensional code is generated by the internet server 104 according to the authorization request sent by the application terminal 102, and is sent to the application terminal 102, and is displayed by the application terminal 102. The authorization request may include authorization parameters, which may include one or more of an application identification, authorization scope information, an application callback address, anti-spoofing information, and an application key. The authorization scope information is authority information of the account of the third-party application required for logging in the application program in the application terminal 102, for example, authority for allowing the application program to use the avatar and the nickname of the account of the third-party application, or issue a message instead of the account.
For example, taking the application program in the application terminal 102 logged in by the wechat account as an example, the authority information may include an avatar, a nickname, a friend relationship of the wechat, or an authority to issue a message instead of the user.
Step 302, the client 101 generates a login and authorization page according to the permission information.
In this embodiment, the login and authorization page has permission information displayed thereon, and the permission information can be selected on the login and authorization page. For example, the authority information is arranged in a certain order on the login and authorization page, a module which can be checked is arranged in front of the authority information, and the authority information corresponding to the module can be selected by checking the module.
In step 303, in response to the first operation on the login and authorization page, the client 101 generates a login confirmation instruction for confirming the login of the third-party application account and sends the login confirmation instruction to the internet server 104.
In this embodiment, the confirmation login instruction includes the selected authority information. The first operation may be selection of the rights information on the login and authorization page, for example, a module that may be checked before checking the rights information.
According to the embodiment of the disclosure, the third-party application on the client is used for scanning and analyzing the two-dimensional code to obtain the authority information of the third-party application account required by the application program in the login application terminal, the login and authorization page is generated according to the authority information, and finally the login confirmation instruction for confirming the login of the third-party application account is generated and sent to the internet server through the first operation of the login and authorization page, so that the user can select the authority of the third-party application required to be authorized when the user logs in the application program by using the third-party application account, and the safety of the user account is improved.
In some embodiments, after step 303, the account login method provided in the embodiments of the present disclosure further includes the following steps:
step 304, the client 101 generates a permission list according to the permission information, and displays the permission list to the user.
In the present embodiment, the authority list includes the authority information selected in the first operation. For example, taking the WeChat account login application as an example, in the first operation, the avatar of the WeChat account and the gender of the WeChat account are selected on the login and authorization page, and then authorized authority information, that is, the avatar of the WeChat account and the gender of the WeChat account, is shown on the authority list.
According to the embodiment of the disclosure, the selected authority information is displayed in the authority list, so that the user can intuitively know which authority is authorized for the logged-in third-party application account, and the user can conveniently master the account of the user.
In some embodiments, after step 303, the account login method provided in the embodiments of the present disclosure further includes the following steps:
in step 305, in response to the second operation, the client 101 generates an offline confirmation instruction and sends an offline confirmation instruction for confirming that the third-party application account is offline from the application program in the application 102 to the internet server 104.
In this embodiment, the second operation includes performing a logoff operation at the client 101. And confirming that the offline instruction comprises account information, namely an account of the third-party application program and authority information corresponding to the account.
It should be noted that the offline operation performed by the client 101 may be an offline operation performed in a third-party application, for example, after the third-party application logs in the application, the state of the logged-in application is displayed on a software interface of the third-party application, and the offline operation can be implemented by clicking an offline button.
In some embodiments, after the client 101 performs the offline operation, the default third-party application account is offline from the application in the application 102 and all authorized permission information for the application is cancelled.
According to the embodiment of the disclosure, a user can know which application programs are logged in by a third-party application account through the client 101, so that the login state of the user's account can be mastered, the user can timely log off the application program under the condition that the user logs in the application program by stealing a number by other people, and the security of the account is greatly improved.
It is noted that while for simplicity of explanation, the foregoing method embodiments have been described as a series of acts or combination of acts, it will be appreciated by those skilled in the art that the present disclosure is not limited by the order of acts, as some steps may, in accordance with the present disclosure, occur in other orders and concurrently. Further, those skilled in the art should also appreciate that the embodiments described in the specification are exemplary embodiments and that acts and modules referred to are not necessarily required by the disclosure.
The above is a description of embodiments of the method, and the embodiments of the apparatus are further described below.
Fig. 4 shows a block diagram of an account login device according to an embodiment of the present disclosure. This account registration means may be included in the client 101 of fig. 1 or implemented as the client 101. As shown in fig. 4, the apparatus includes:
the scanning and analyzing module 401 is configured to scan and analyze a two-dimensional code to obtain permission information of a third-party application account required by an application program in the login application terminal 102, where the two-dimensional code is generated by the internet server 104 according to an authorization request sent by the application terminal 102, sent to the application terminal 102, and displayed by the application terminal 102.
The page generating module 402 is configured to generate a login and authorization page according to the authority information, where the login and authorization page shows the authority information, and the authority information can be selected on the login and authorization page.
An instruction sending module 403, configured to generate a login confirmation instruction for confirming to login the third-party application account in response to the first operation on the login and authorization page, and send the login confirmation instruction to the internet server 104, where the login confirmation instruction includes the selected permission information; the first operation includes selecting the rights information on a login and authorization page.
In some embodiments, the account login device further comprises:
the list generating module 404 is configured to generate a permission list according to the permission information, and display the permission list, where the permission list includes the permission information selected in the first operation.
In some embodiments, the instruction sending module 403 is further configured to, in response to the second operation, generate an offline confirmation instruction and send an offline confirmation instruction to the interconnection server 104, where the offline confirmation instruction confirms that the third-party application account is offline from the application program in the application terminal 102; the second operation includes performing a logoff operation at the client 101.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the described module may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
FIG. 5 shows a schematic block diagram of an electronic device that may be used to implement embodiments of the present disclosure. As shown, the device includes a Central Processing Unit (CPU)501 that can perform various appropriate actions and processes according to computer program instructions stored in a Read Only Memory (ROM)502 or computer program instructions loaded from a storage unit 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data required for the operation of the device can also be stored. The CPU 501, ROM 502, and RAM 503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
A number of components in the device are connected to the I/O interface 505, including: an input unit 506 such as a keyboard, a mouse, or the like; an output unit 507 such as various types of displays, speakers, and the like; a storage unit 508, such as a magnetic disk, optical disk, or the like; and a communication unit 509 such as a network card, modem, wireless communication transceiver, etc. The communication unit 509 allows the device to exchange information/data with other devices through a computer network such as the internet and/or various telecommunication networks.
The processing unit 501 executes the respective methods and processes described above, such as an account login method. For example, in some embodiments, the account login method may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as storage unit 508. In some embodiments, part or all of the computer program may be loaded and/or installed onto the device via the ROM 502 and/or the communication unit 509. When the computer program is loaded into the RAM 503 and executed by the CPU 501, one or more steps of the account login method described above may be performed. Alternatively, in other embodiments, CPU 501 may be configured to perform the account login method in any other suitable manner (e.g., by way of firmware).
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), an Application Specific Standard Product (ASSP), a system on a chip (SOC), a load programmable logic device (CPLD), and the like.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
Further, while operations are depicted in a particular order, this should be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. Under certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limitations on the scope of the disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single implementation. Conversely, various features that are described in the context of a single implementation can also be implemented in multiple implementations separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.

Claims (8)

1. An account login method is characterized by comprising the following steps:
scanning and analyzing a two-dimensional code by using a third-party application on a client to acquire authority information of a third-party application account required by logging in an application program in an application terminal, wherein the two-dimensional code is generated by an internet server according to an authorization request sent by the application terminal, is sent to the application terminal and is displayed by the application terminal;
generating a login and authorization page according to the authority information, wherein the authority information is displayed on the login and authorization page and can be selected on the login and authorization page;
responding to the first operation of the login and authorization page, generating a login confirmation instruction for confirming the login of the third-party application account, and sending the login confirmation instruction to the internet server, wherein the login confirmation instruction comprises the selected authority information; the first operation comprises selecting the permission information on the login and authorization page.
2. The method of claim 1, wherein after generating and sending a login confirmation instruction for confirming login to the third-party application account to the internet server in response to the first operation on the login and authorization page, the method further comprises:
and generating a permission list according to the permission information, and displaying the permission list, wherein the permission list comprises the permission information selected in the first operation.
3. The method of claim 1, wherein after generating and sending a login confirmation instruction for confirming login to the third-party application account to the internet server in response to the first operation on the login and authorization page, the method further comprises:
responding to the second operation, generating a offline confirmation instruction and sending the offline confirmation instruction for confirming that the third party application account is offline from the application program in the application terminal to the internet server; the second operation comprises executing a logoff operation at the client.
4. An account login apparatus, comprising:
the system comprises a scanning and analyzing module, a storage module and a display module, wherein the scanning and analyzing module is used for scanning and analyzing a two-dimensional code to acquire authority information of a third-party application account required by an application program in a login application terminal, and the two-dimensional code is generated by an internet server according to an authorization request sent by the application terminal, is sent to the application terminal and is displayed by the application terminal;
the page generation module is used for generating a login and authorization page according to the authority information, the authority information is displayed on the login and authorization page, and the authority information can be selected on the login and authorization page;
the instruction sending module is used for responding to the first operation of the login and authorization page, generating a login confirmation instruction for confirming that the third-party application account is logged in and sending the login confirmation instruction to the internet server, wherein the login confirmation instruction comprises the selected authority information; the first operation comprises selecting the permission information on the login and authorization page.
5. The apparatus of claim 4, further comprising:
and the list generating module is used for generating a permission list according to the permission information and displaying the permission list, wherein the permission list comprises the permission information selected in the first operation.
6. The device according to claim 4, wherein the instruction sending module is further configured to generate a offline confirmation instruction in response to the second operation, and send the offline confirmation instruction to the internet server, wherein the offline confirmation instruction confirms that the third-party application account is offline from the application program in the application terminal; the second operation comprises executing a logoff operation at the client.
7. An electronic device comprising a memory and a processor, the memory having stored thereon a computer program, wherein the processor, when executing the program, implements the method of any of claims 1-3.
8. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, carries out the method according to any one of claims 1 to 3.
CN202010152589.2A 2020-03-06 2020-03-06 Account login method and device, electronic equipment and computer readable storage medium Pending CN113360855A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010152589.2A CN113360855A (en) 2020-03-06 2020-03-06 Account login method and device, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010152589.2A CN113360855A (en) 2020-03-06 2020-03-06 Account login method and device, electronic equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN113360855A true CN113360855A (en) 2021-09-07

Family

ID=77524144

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010152589.2A Pending CN113360855A (en) 2020-03-06 2020-03-06 Account login method and device, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN113360855A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104253784A (en) * 2013-06-25 2014-12-31 腾讯科技(深圳)有限公司 Logging and authorization method and system
CN104348612A (en) * 2013-07-23 2015-02-11 腾讯科技(深圳)有限公司 Third-party website login method based on mobile terminal and mobile terminal
CN109862078A (en) * 2019-01-08 2019-06-07 腾讯科技(深圳)有限公司 Client login method, device and system, storage medium and electronic device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104253784A (en) * 2013-06-25 2014-12-31 腾讯科技(深圳)有限公司 Logging and authorization method and system
CN104348612A (en) * 2013-07-23 2015-02-11 腾讯科技(深圳)有限公司 Third-party website login method based on mobile terminal and mobile terminal
CN109862078A (en) * 2019-01-08 2019-06-07 腾讯科技(深圳)有限公司 Client login method, device and system, storage medium and electronic device

Similar Documents

Publication Publication Date Title
US10462118B2 (en) Systems and methods for login and authorization
CN107070945B (en) Identity login method and equipment
CN105610810B (en) Data processing method, client and server
US9805182B1 (en) Authentication using a client device and a mobile device
US9756056B2 (en) Apparatus and method for authenticating a user via multiple user devices
US20180348721A1 (en) Automatic portable electronic device configuration
US8826399B2 (en) Systems and methods for fast authentication with a mobile device
EP2498472A1 (en) Method and system for granting access to a secured website
EP2751733B1 (en) Method and system for authorizing an action at a site
US20160267475A1 (en) Method and system for secure transactions on a social network platform
US10735398B1 (en) Rolling code authentication techniques
CN114491436A (en) Contract signing method and device, electronic equipment and storage medium
CN110458507B (en) Authorization method and device for public number business hosting
CN115225362A (en) Verification method, device, equipment and storage medium of man-machine behavior
US20180241745A1 (en) Method and system for validating website login and online information processing
CN104079527A (en) Information processing method and electronic equipment
CN116916310A (en) Verification code generation and verification method and device and electronic equipment
CN106302344B (en) Security sweep method and system
US20180124034A1 (en) Image based method, system and computer program product to authenticate user identity
KR20210034976A (en) Security device for mobile device
CN113360855A (en) Account login method and device, electronic equipment and computer readable storage medium
CN106878018B (en) Operation verification method and device
CN109165490A (en) A kind of data inputting method and device
CN105227518A (en) Server, client, interactive system and information method of sending and receiving
CN115174181B (en) Method, device, equipment and storage medium for realizing single sign-on

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination